시험덤프
매달, 우리는 1000명 이상의 사람들이 시험 준비를 잘하고 시험을 잘 통과할 수 있도록 도와줍니다.
  / 1V0-81.20 덤프  / 1V0-81.20 문제 연습

VMware 1V0-81.20 시험

Associate VMware Security 온라인 연습

최종 업데이트 시간: 2024년11월08일

당신은 온라인 연습 문제를 통해 VMware 1V0-81.20 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.

시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 1V0-81.20 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 55개의 시험 문제와 답을 포함하십시오.

 / 1

Question No : 1


Refer to the exhibit.



Whichstatement is true about the firewall rule?

정답:

Question No : 2


Which would require a Layer 7 Firewall?

정답:
Explanation:
Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-8F3CB282-B38E-49E1-951A-7D6B972B1FB7.html

Question No : 3


What is the safe course of action for a USB disk of unknown ownership and origin?

정답:
Explanation:
Reference: https://blogs.vmware.com/vsphere/2020/02/good-security-thrives-in-simplicity.html

Question No : 4


In Workspace ONE Intelligence, which of the following is a role that can be assigned to an administrator account?

정답:

Question No : 5


Which three are components of the NSX-T Software-defined Firewall? (Choose three.)

정답:
Explanation:
Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware-nsx-datasheet.pdf

Question No : 6


Which three common mitigations for social engineering attacks? (Choose three.)

정답:

Question No : 7


What is the default user’s network range when creating a new access policy rule in Workspace ONE Access?

정답:
Explanation:
Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-Access/20.01/ws1_access_authentication/GUID-3D7AB065-E2ED-4525-B575-2A576BAA3CC3.html

Question No : 8


Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)

정답:
Explanation:
Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/Windows_Desktop_Device_Management/GUID-uemWindeskProfiles.html

Question No : 9


Refer to the exhibit.



From theVMware Carbon Black Cloud console, what page do you go to after clicking the Non-Malware bar in the Potentially Suspicious Activity chart?

정답:
Explanation:
Reference: https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-user-guide.pdf (15)

Question No : 10


If the Compromised Protection switch is enabled in Workspace ONE UEM, what is the
expected behavior on compromised devices in the environment?

정답:

Question No : 11


Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)

정답:
Explanation:
Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-21_intel_automations.html

Question No : 12


Which option would be considered an example of aHardware Based Exploit?

정답:
Explanation:
Reference: https://www.kaspersky.com/resource-center/definitions/what-is-jailbreaking

Question No : 13


In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence?

정답:
Explanation:
Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-01_intel_intro.html#:~:text=Access%20Workspace%20ONE%20Intelligence&text=Access %20the%20reports%20by%20navigating,console%2C%20follow%20the%20required%20st eps

Question No : 14


Which three are key features of VMware Carbon Black Cloud Enterprise EDR? (Choose three.)

정답:
Explanation:
Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmwcb-enterprise-edr-datasheet.pdf (2)

Question No : 15


When using VMware Carbon Black Live Response, what command will show all active processes?

정답:

 / 1